DefensePro

DefensePro X : ํ•œ ์ฐจ์› ๋†’์€ DDoS ๋ณดํ˜ธ

Adaptive Protection From Today’s Most Advanced DDoS Attacks.

DefensePro๊ฐ€ ํ•˜๋Š” ์ผ์€ ๋ฌด์—‡์ž…๋‹ˆ๊นŒ?

DefensePro, part of Radware’s attack mitigation solution, provides automated DDoS protection from fast-moving, high-volume, encrypted or very short-duration threats. It defends against IoT-based, Burst, DNS and TLS/SSL attacks to secure organizations against emerging network multi-vector attacks, ransom DDoS campaigns, IoT botnets, phantom floods, and other types of cyberattacks.

๋ผ๋“œ์›จ์–ด DefensePro X DDoS ๊ฒฝ๊ฐ

As attacks get more sophisticated and attackers sharper, the threat landscape continues to evolve with all kinds of advanced DDoS attacks. Radware’s newest DDoS mitigation platforms, DefensePro X and Cyber Controller, give customers advanced protection with the high performance and scale needed to combat the threats of today and tomorrow.

DefensePro ์ฃผ์š” ๊ธฐ๋Šฅ

์ตœ๊ณ ์˜ ์ •ํ™•๋„๋ฅผ ์œ„ํ•œ ํ–‰๋™ ๊ธฐ๋ฐ˜ ํƒ์ง€

์ตœ๊ณ ์˜ ์ •ํ™•๋„๋ฅผ ์œ„ํ•œ ํ–‰๋™ ๊ธฐ๋ฐ˜ ํƒ์ง€

์กฐ์ง์€ ํŠนํ—ˆ ๋“ฑ๋ก๋œ ํ–‰๋™ ๊ธฐ๋ฐ˜ ํƒ์ง€ ๊ธฐ์ˆ ์„ ํ™œ์šฉํ•ด ์˜คํƒ์„ ์ตœ์†Œํ™”ํ•˜๋ฉด์„œ ์‹ค์‹œ๊ฐ„์œผ๋กœ ์ •ํ™•ํ•˜๊ฒŒ ๊ณต๊ฒฉ์„ ํƒ์ง€ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

Encrypted Web DDoS Protection

Encrypted Web DDoS Protection

Automated real-time signatures for encrypted traffic layers, dynamically adapting to the specific characteristics of the attacks as it morphs, without requiring the encryption keys.

์ž๋™ํ™”๋œ ์ œ๋กœ๋ฐ์ด DDoS ๊ณต๊ฒฉ ๋ณดํ˜ธ

์ž๋™ํ™”๋œ ์ œ๋กœ๋ฐ์ด DDoS ๊ณต๊ฒฉ ๋ณดํ˜ธ

๊ณต๊ฒฉ ์‹œ๊ทธ๋‹ˆ์ฒ˜๊ฐ€ ์ž๋™์œผ๋กœ ์ƒ์„ฑ๋˜์–ด ์ œ๋กœ ๋ฐ์ด ๋ฐ ์•Œ๋ ค์ง€์ง€ ์•Š์€ ๊ณต๊ฒฉ์œผ๋กœ๋ถ€ํ„ฐ ์ •ํ™•ํ•˜๊ฒŒ ๋ณดํ˜ธํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. DefensePro๋Š” 18์ดˆ ์ด๋‚ด์— ์ตœ์ ์˜ ์‹œ๊ทธ๋„ˆ์ฒ˜๋ฅผ ํƒ์ง€, ํŠน์„ฑํ™” ๋ฐ ์ƒ์„ฑํ•ด ์•Œ๋ ค์ง€์ง€ ์•Š์€ ๊ณต๊ฒฉ์„ ์ฐจ๋‹จํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

์œ ์—ฐํ•œ ๋ฐฐํฌ ์˜ต์…˜

์œ ์—ฐํ•œ ๋ฐฐํฌ ์˜ต์…˜

Multiple deployment options are available with cloud-based, hardware-based and hybrid solutions to match any customer architecture or use case.

์™„์ „ ๊ด€๋ฆฌํ˜• ๋””๋ฐ”์ด์Šค๊ฐ€ ์„ ์‚ฌํ•˜๋Š” ๋งˆ์Œ์˜ ์•ˆ์ •

์™„์ „ ๊ด€๋ฆฌํ˜• ๋””๋ฐ”์ด์Šค๊ฐ€ ์„ ์‚ฌํ•˜๋Š” ๋งˆ์Œ์˜ ์•ˆ์ •

On-premises device management provided by Radwareโ€™s Emergency Response Team (ERT) includes security experts that set up, manage and tune the device to keep it synchronized with business processes and policies.

Adaptive and Multi-layered DNS DDoS Attack Protection

Adaptive and Multi-layered DNS DDoS Attack Protection

Real-time detection and mitigation of both known and zero-day DNS DDoS attacks, ensuring that networks and services remain accessible and resilient.

 

์›ํ™œํ•œ ๋ณด์•ˆ ๊ฒฝํ—˜

  • ์ธ๋ผ์ธ ๋ฐ ๊ฒฝ๋กœ ์™ธ ๋ฐฐํฌ ๋ชจ๋‘์— ๋Œ€ํ•œ ๊ณต๊ฒฉ ๋ผ์ดํ”„ ์‚ฌ์ดํด ๋ฐ ๊ฒฝ๊ฐ ๋ถ„์„์— ๋Œ€ํ•œ ํ†ต์ผ๋œ ๊ฐ€์‹œ์„ฑ์„ ์ œ๊ณตํ•˜๋Š” ๊ณ ๊ธ‰ ๋ณด์•ˆ ์šด์˜ ๋Œ€์‹œ๋ณด๋“œ๋ฅผ ์‚ฌ์šฉํ•˜๋Š” ํ’๋ถ€ํ•œ ์‚ฌ์šฉ์ž ๊ฒฝํ—˜ ๋ฐ ๊ฐ€์‹œ์„ฑ
  • ํ‰์‹œ์™€ ๊ณต๊ฒฉ ์ค‘ ํŠธ๋ž˜ํ”ฝ ํ†ต๊ณ„์— ๋Œ€ํ•œ ํฌ๊ด„์ ์ธ ๊ฐ€์‹œ์„ฑ์„ ๊ฐ–์ถ˜ ๋„คํŠธ์›Œํฌ ๋ถ„์„
  • ๊ฒฝ๋กœ ๋ฐ ์ธ๋ผ์ธ DDoS ๋ณดํ˜ธ ์†”๋ฃจ์…˜์— ๋Œ€ํ•œ ํ†ตํ•ฉ ๊ฐ€์‹œ์„ฑ ๋ฐ ์ œ์–ด๋ฅผ ํ†ตํ•œ ๊ด€๋ฆฌ ๋ฐ ๊ตฌ์„ฑ ๊ฐ„์†Œํ™”, ๋ฌธ์ œํ•ด๊ฒฐ ์ตœ์ ํ™”, ํ’๋ถ€ํ•œ ๊ฒ€์ƒ‰ ๋ฐ ํ•„ํ„ฐ ๊ธฐ๋Šฅ
  • ๊ด‘๋ฒ”์œ„ํ•œ ๋ณดํ˜ธ ๋ฐ ๊ฒฝ๊ฐ ์šฉ๋Ÿ‰(6gbps - 800gbps), ๊ฐ€์ƒ ์–ดํ”Œ๋ผ์ด์–ธ์Šค, ๋ผ๋“œ์›จ์–ด ํด๋ผ์šฐ๋“œ DDoS ๋ณดํ˜ธ ์„œ๋น„์Šค์™€ ํ†ตํ•ฉ๋œ ํ•˜์ด๋ธŒ๋ฆฌ๋“œ ์†”๋ฃจ์…˜์„ ์ œ๊ณตํ•˜๋Š” ๋‹ค์ค‘ ๋ฐฐํฌ ์˜ต์…˜

์›ํ™œํ•œ ๋ณด์•ˆ ๊ฒฝํ—˜

Preemptive Multi-layered DDoS Protection

DefensePro DDoS ๋ณดํ˜ธ๋Š” ERT ๋ณด์•ˆ ์ „๋ฌธ ์ง€์‹๊ณผ ์‹ค์‹œ๊ฐ„ ์œ„ํ˜‘ ์ธํ…”๋ฆฌ์ „์Šค ์„œ๋น„์Šค๋ฅผ ํ™œ์šฉํ•˜์—ฌ ๋‹ค์ค‘๊ณ„์ธต ๋ณดํ˜ธ์ฒด์ œ๋ฅผ ๊ตฌ์ถ•ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.
๋ผ๋“œ์›จ์–ด์˜ ERT๋Š” DefensePro๊ฐ€ ์ œ๊ณตํ•˜๋Š” ์ž๋™ํ™”๋œ ์‹ค์‹œ๊ฐ„ ๋ณดํ˜ธ ๊ธฐ๋Šฅ์„ ํ™•์žฅํ•˜์—ฌ ๊ณต๊ฒฉ์ž๊ฐ€ ์กฐ์ง์˜ ๋„คํŠธ์›Œํฌ๋ฅผ ํ‘œ์ ์œผ๋กœ ์‚ผ๊ธฐ ์ „์— ๊ณต๊ฒฉ์ž๋ฅผ ์„ ์ œ์ ์œผ๋กœ ์ฐจ๋‹จํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

Stay One Step Ahead of Threats

Radware’s Threat Intelligence Subscriptions complement application and network security via constant updates of new threats, risks and vulnerabilities. By crowdsourcing, correlating and validating real-life attack data from multiple sources, Radware immunizes your DDoS protection system. It provides real-time intelligence for preemptive protection and enables multi-layered protection against all types of threats.

Radware’s Threat Intelligence Subscriptions

Enhance Radware’s DDoS protection and extend its automated, real-time behavioral threat analysis for preemptive protection.

Radware’s ERT Security Update Subscription (SUS) bolsters protection of network elements, hosts and applications against the latest security vulnerabilities and threats with rapid and continuous updates, as well as emergency updates for immediate response and environment-specific custom signatures.

Radware’s ERT Active Attackers Feed provides preemptive protection against DDoS attacks, scanners, anonymous proxies, IoT botnets and web application attacks by identifying and blocking known IP addresses that were recently involved in attacks in real time. It aggregates and correlates information from multiple sources making its data highly accurate.

  • ๋ผ๋“œ์›จ์–ด์˜ ๊ธ€๋กœ๋ฒŒ ์œ„ํ˜‘ ํƒ์ง€ ๋ฐ ๊ธฐ๋งŒ ์ธํ”„๋ผ
  • ํด๋ผ์šฐ๋“œ ๋ณด์•ˆ ๊ณ ๊ฐ ๋„คํŠธ์›Œํฌ
  • ERT ์œ„ํ˜‘ ์—ฐ๊ตฌ ๊ทธ๋ฃน
  • ์‚ฌ์ด๋ฒ„์œ„ํ˜‘์—ฐํ•ฉ(Cyber โ€‹โ€‹Threat Alliance) ํšŒ์›์ธ ์„ ๋„์ ์ธ ๋ณด์•ˆ ๊ณต๊ธ‰์—…์ฒด

๋ผ๋“œ์›จ์–ด์˜ ์œ„์น˜ ๊ธฐ๋ฐ˜ ๊ฒฝ๊ฐ ์†”๋ฃจ์…˜์€ ๊ตญ๊ฐ€ ๊ธฐ๋ฐ˜ DDoS ๊ณต๊ฒฉ์œผ๋กœ๋ถ€ํ„ฐ ๋ฐ์ดํ„ฐ ์„ผํ„ฐ์™€ ๋„คํŠธ์›Œํฌ๋ฅผ ๋ณดํ˜ธํ•˜๋Š” ๋ฐ ๋„์›€์ด ๋ฉ๋‹ˆ๋‹ค. ๋ผ๋“œ์›จ์–ด์˜ ์†”๋ฃจ์…˜์€ ๊ธ€๋กœ๋ฒŒ ๊ทœ์ • ์ค€์ˆ˜ ๋ฐ ์šด์˜ ์š”๊ฑด ์ถฉ์กฑ์„ ์šฉ์ดํ•˜๊ฒŒ ํ•˜๊ณ , IP ์„œ๋ธŒ๋„ท์˜ ์ง€๋ฆฌ์  ์œ„์น˜ ๋งคํ•‘์„ ๊ธฐ๋ฐ˜์œผ๋กœ ํ•˜๋Š” ๊ตญ๊ฐ€๋ณ„ ์ฆ‰๊ฐ์  ์œ ์ž… ํŠธ๋ž˜ํ”ฝ ํ•„ํ„ฐ๋ง์„ ํ—ˆ์šฉํ•˜์—ฌ ์กฐ์ง์˜ ๋‹ˆ์ฆˆ์— ๋งž๋Š” ๋ฐ์ดํ„ฐ ํ๋ฆ„์„ ๋ณด์žฅํ•ฉ๋‹ˆ๋‹ค.

A network of globally distributed sensors – honeypots - running services that attract bots engaged in malicious activity around the world. Such bots are attempting to compromise, abuse and hack into computers, create new botnets and launch DDoS attacks.

The deception network attracts hundreds of thousands of malicious IPs, generating millions of events daily. The automatic analysis algorithms provide insights and categorization of various types of malicious activity from port scanning and reconnaissance through password Brute Force attempts to DNS reflection attacks.

Radware proprietary and patented algorithms running on the deception network are used to catalog and identify new and emerging threat actors, as well as to analyze malicious behavior designed to hide the attacker such as spoofing and anonymizing. Combining these creates a real time, non-spoofed IP list of malicious actors employing DDoS related behavior.

๋ผ๋“œ์›จ์–ด ์˜์—…๋ถ€์— ๋ฌธ์˜ํ•˜๊ธฐ

๋ผ๋“œ์›จ์–ด ์ „๋ฌธ๊ฐ€๋“ค์ด ๊ท€ํ•˜์˜ ์งˆ๋ฌธ์— ๋‹ตํ•˜๊ณ , ์–ด๋–ค ํ•ด๊ฒฐ์ฑ…์ด ํ•„์š”ํ•œ์ง€ ์ง„๋‹จํ•˜๊ณ , ์–ด๋–ค ์ œํ’ˆ์ด ๊ท€์‚ฌ์˜ ์‚ฌ์—…์— ๊ฐ€์žฅ ์ ํ•ฉํ•œ์ง€ ์ดํ•ดํ•˜์‹ค ์ˆ˜ ์žˆ๋„๋ก ๋„์™€๋“œ๋ฆฝ๋‹ˆ๋‹ค.

ํ˜„์žฌ ๊ณ ๊ฐ์ด์‹ญ๋‹ˆ๊นŒ?

๊ธฐ์ˆ  ์ง€์› ๋˜๋Š” ์ถ”๊ฐ€ ์„œ๋น„์Šค๊ฐ€ ํ•„์š”ํ•˜์‹œ๊ฑฐ๋‚˜ ๋‹น์‚ฌ ์ œํ’ˆ ๋ฐ ์†”๋ฃจ์…˜์— ๊ด€ํ•ด ๊ถ๊ธˆํ•˜์‹  ์ ์ด ์žˆ๋‹ค๋ฉด ์ €ํฌ๊ฐ€ ์ฆ‰์‹œ ๋„์™€๋“œ๋ฆฌ๊ฒ ์Šต๋‹ˆ๋‹ค.

์‚ฌ์—…์žฅ ์†Œ์žฌ์ง€
์ฆ‰์‹œ ๋‹ต์„ ๊ตฌํ•  ์ˆ˜ ์žˆ๋Š” ์ง€์‹ ์ •๋ณด ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค
๋ฌด๋ฃŒ ์˜จ๋ผ์ธ ์ œํ’ˆ ๊ต์œก
๋ผ๋“œ์›จ์–ด ๊ธฐ์ˆ  ์ง€์›๋ถ€์™€์˜ ์ƒ๋‹ด
๋ผ๋“œ์›จ์–ด ๊ณ ๊ฐ ํ”„๋กœ๊ทธ๋žจ ์ฐธ์—ฌ

์†Œ์…œ๋ฏธ๋””์–ด

์ „๋ฌธ๊ฐ€๋“ค๊ณผ ๊ต๋ฅ˜ํ•˜๊ณ  ๋ผ๋“œ์›จ์–ด ๊ธฐ์ˆ ์— ๊ด€ํ•œ ๋Œ€ํ™”์— ์ฐธ์—ฌํ•˜์„ธ์š”.

๋ธ”๋กœ๊ทธ
๋ณด์•ˆ ์—ฐ๊ตฌ ์„ผํ„ฐ
CyberPedia